- search hit 1 of 1
Cryptanalysis of the Light-Weight Cipher A2U2
- In recent years, light-weight cryptography has received a lot of attention. Many primitives suitable for resource-restricted hardware platforms have been proposed. In this paper, we present a cryptanalysis of the new stream cipher A2U2 presented at IEEE RFID 2011 [9] that has a key length of 56 bit. We start by disproving and then repairing an extremely efficient attack presented by Chai et al.In recent years, light-weight cryptography has received a lot of attention. Many primitives suitable for resource-restricted hardware platforms have been proposed. In this paper, we present a cryptanalysis of the new stream cipher A2U2 presented at IEEE RFID 2011 [9] that has a key length of 56 bit. We start by disproving and then repairing an extremely efficient attack presented by Chai et al. [8], showing that A2U2 can be broken in less than a second in the chosen-plaintext case. We then turn our attention to the more challenging known-plaintext case and propose a number of attacks. A guess-and-determine approach combined with algebraic cryptanalysis yields an attack that requires about 249 internal guesses. We also show how to determine the 5-bit counter key and how to reconstruct the 56-bit key in about 238 steps if the attacker can freely choose the IV. Furthermore, we investigate the possibility of exploiting the knowledge of a “noisy keystream” by solving a Max-PoSSo problem. We conclude that the cipher needs to be repaired and point out a number of simple measures that would prevent the above attacks.…
Document Type: | Conference Proceeding |
---|---|
Conference Type: | Konferenzartikel |
Zitierlink: | https://opus.hs-offenburg.de/983 | Bibliografische Angaben |
Title (English): | Cryptanalysis of the Light-Weight Cipher A2U2 |
Conference: | 13th IMA International Conference (IMACC 2011), Oxford, UK, December 2011 |
Author: | Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik ZennerStaff MemberGND, Mathieu David |
Year of Publication: | 2011 |
Creating Corporation: | IMACC |
Place of publication: | Berlin, Heidelberg |
Publisher: | Springer |
First Page: | 375 |
Last Page: | 390 |
Parent Title (English): | Cryptography and Coding |
Editor: | Liqun Chen |
Volume: | LNCS 7089 |
ISBN: | 978-3-642-25515-1 (Softcover) |
ISBN: | 978-3-642-25516-8 (eBook) |
ISSN: | 0302-9743 |
ISSN: | 1611-3349 (E-ISSN) |
DOI: | https://doi.org/10.1007/978-3-642-25516-8_23 |
URL: | http://link.springer.com/chapter/10.1007/978-3-642-25516-8_23 |
Language: | English | Inhaltliche Informationen |
Institutes: | Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) |
Institutes: | Bibliografie | Formale Angaben |
Open Access: | Closed Access |
Licence (German): | Urheberrechtlich geschützt |